vicsanjinez / wazuh-config
Configurations to implement Wazuh
☆11Updated 2 years ago
Alternatives and similar repositories for wazuh-config:
Users that are interested in wazuh-config are comparing it to the libraries listed below
- SIEM Cheat Sheet☆73Updated last year
- ☆174Updated last year
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆78Updated last month
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆38Updated 3 years ago
- ☆102Updated 2 weeks ago
- ☆34Updated last year
- A collection of various SIEM rules relating to malware family groups.☆66Updated 10 months ago
- MISP Playbooks☆198Updated 2 months ago
- ☆32Updated 5 months ago
- A powerful home-lab focused on setting up Splunk SIEM and real-world use cases. If you’re interested to become SOC Analyst(Tier 1/2) , th…☆51Updated last year
- Wazuh integration TheHive☆35Updated 2 years ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆29Updated 7 months ago
- CrowdStrike Falcon Queries For Advanced Threat Detection☆17Updated last month
- ThreatSeeker: Threat Hunting via Windows Event Logs☆120Updated last year
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆101Updated 8 months ago
- Repository resource for threat hunter☆158Updated 6 years ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆88Updated 5 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆154Updated 3 weeks ago
- AI-Powered Dark Web OSINT Tool☆36Updated this week
- ☆31Updated 3 years ago
- This repository is a comprehensive collection of resources, documentation, apps, and add-ons related to Splunk, a powerful data analytics…☆21Updated this week
- This repository contains Splunk queries to hunt some anomalies☆41Updated 2 years ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆61Updated last year
- Some important DFIR Resources☆83Updated 2 years ago
- CarbonBlack EDR detection rules and response actions☆71Updated 7 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated last year
- Useful resources about phishing email analysis☆82Updated 2 months ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆83Updated last year
- ☆45Updated last year
- ☆74Updated last month